nuremberg, germany 26.–28.2 - yocto project · systems engineering, 7. embedded vision, 8....

16
Nuremberg, Germany 26.–28.2.2019 CONFERENCE PROGRAM www.embedded-world.eu Organized by Conference Sponsors

Upload: others

Post on 18-Jul-2020

6 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

Nuremberg, Germany

26.–28.2.2019

CONFERENCE PROGRAMwww.embedded-world.eu

Organized by

Conference Sponsors

Page 2: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

181031_FranSupp_EWEC_DE_Eng.indd 1 10/25/18 1:35 PM

Page 3: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

3

Now in its 17th year, the embedded world Conference takes up the title of one of its precursors from the 1990s. Back then “Embedded Intelligence” was rather a vision of the future but now it is increasingly becoming reality and shaping more and more systems: from autonomous vehicles over image recognition and embedded vision systems to preventive and demand-driven maintenance in Industry 4.0 systems, from small edge computers to high-performance cloud servers. These developments not only open up immense possibilities and business opportunities, but are also closely associated with many technical, economic, social and ethical issues.

With a program of high-quality and solution-oriented presentations, the embedded world Conference 2019 aims to contribute once more to the success of an industry that has now become an essential part of the technological future and, as such, a basis for our continued economic success.

The embedded world Conference 2019 is made up of 10 subject areas, which are clearly structured in the program and presented in different colors. These are: 1. Internet of Things, 2. Connected Systems, 3. Embedded OS, 4. Safety & Security, 5. Hardware Engineering, 6. Software &

embedded world Conference 2019 – Embedded Intelligence

Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented presentations of each session build upon one another and examine questions from different perspectives. Discussion and an active exchange of ideas with the speakers as well as among conference participants are encouraged. The 30-minute presentations of the sessions will be complemented by 12 classes, which provide comprehensive basic information on selected topics in the form of condensed training courses.

It is not possible to describe all 250 presentations in detail here. You will find them fully explained on the following pages of this booklet.

The steering board of the embedded world Conference 2019 wishes all participants stimulating discussions about new ideas and solutions in order to be able to cope more easily and better with the immense challenges that lie ahead. You are welcome to gain great insights in a pulsating atmosphere.

Prof. Dr.-Ing. Axel Sikora Chairman of embedded world Conference

Prof. Dr.-Ing. Axel Sikora Chairman of embedded world Conference

Page 4: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

4

CONFERENCE PROGRAM

www.embedded-world.eu

KEYNOTE-SPEAKERS

Jim Tung, MathWorks Conference Keynote: Developing Game-Changing Embedded Intelligence February 26th, 2019, 1:30 PM

Jim Tung is a MathWorks Fellow, focusing on business and technology strategy and working with key customers and partners. Jim has more than 35 years of experience in real-time systems, data acquisition, and technical computing, including 30 years at MathWorks. Jim was previously vice president of marketing and vice president of business development at MathWorks, and earlier held marketing and sales management positions at Lotus Development and Keithley DAS, a pioneering manufacturer of PC-based data acquisition systems.

Jean-Marc Chery, STMicroelectronics Conference Keynote: Embedded Intelligence for the Next Wave of Smart Systems – Opportunities and Challenges on the Edge February 27th, 2019, 1:30 PM

Jean-Marc Chery is STMicroelectronics’ President and Chief Executive Officer since May 31st, 2018. In July 2017 Chery had been appointed Deputy CEO of ST with overall responsibility for Technology and Manufacturing, as well as for Sales and Marketing operations. Before that, he had held a broad range of management positions across ST functions throughout his career. Chery currently chairs the board of directors of STS, ST’s manufacturing joint venture in China, and is a board member of the European microelectronics R&D program AENEAS.

1. Internet of Things – Platforms & Applications

2. Connected Systems 3. Embedded OS 4. Safety & Security 5. Hardware Engineering 6. Software & Systems Engineering7. Embedded

Vision8. Autonomous &

Intelligent Systems9. Embedded GUI & HMI

10. System-on-Chip

DAY 1: morning

Session 2.1: Communication I CAN

Session 2.2: Communication II Bluetooth

Session 3.1: OS Basics

Class 3.1: The Robert Berger Class: Embedded Linux – a Crash Course

Session 4.1 I: HW-based Security I

Session 4.2: Functional Safety

Session 5.1: RISC-V I Overview

Class 5.1: Ultra Low Power

Session 6.1: SW-Engineering ILanguages & Standards

Session 6.2 I: MISRA I

Class 6.1: The Bruce Douglass Class 1: Modeling

Session 7.1 I: Embedded Vision I

Session 8.1: Intelligent Systems IApplications

DAY 1: afternoon

Session 2.3: Communication IIIRealtime & TSN

Session 3.2: OSADL

Session 4.1 II: HW-based Security II

Session 5.2: RISC-V IISecurity

Session 6.2 II: MISRA II

Session 7.1 II: Embedded Vision II

Session 8.2: Intelligent Systems IIHardware

Session 9.1: Embedded GUI & HMI

Session 5.3: RISC-V IIISystem

DAY 2: morning

Session 1.1 I: IoT I

Session 2.4: Communication IVWireless Physical & Design Aspects

Session 3.3: Linux

Class 3.2: Embedded Android Workshop

Session 4.3 I: Security Architectures & Hacking I

Class 4.1: The ESCRYPT Class

Class 5.2: RISC-V Workshop I

Session 6.3: SW-Engineering IIDesign & Modeling

Class 6.2: The Bruce Douglass Class 2 Agile

Session 8.3: Intelligent Systems IIIAutonomous Driving

Session 10.1: SoC I Analog Circuits & Solutions

Session 10.2 I: SoC II EDA I

DAY 2: afternoon

Session 1.1 II: IoT II

Session 2.5: Communication VWireless Multiprotocol

Session 3.4: Virtualization

Class 3.3: Linux Hands-on Workshop with BeagleBoard.org PocketBeagle

Session 4.3 II: Security Architectures & Hacking II

Session 5.4: Power Supply

Session 6.4: SW-Engineering IIISW-Quality I

Session 8.4: Intelligent Systems IVDevelopment Methods

Session 10.2 II: SoC II EDA II

DAY 3: morning

Session 1.2: IoT III

Session 2.6 I: NB-IoT & LPWA I

Session 2.8 I: Wireless Power I

Session 3.5: OS-Security

Class 3.4: The Mc Guire Class:Introduction to Linux Kernel Tools

Session 4.4 I: Securing IoT I

Session 6.5: SW-Engineering IVDevelopment Process

Session 6.7: SW-Engineering VISW-Testing

Class 6.3: The Bruce Douglass Class 3 Safety & Security

Class 6.4: The Greg Davis ClassC / C++

Session 10.3: SoC IIIComplex Ics & System Solutions

DAY 3: afternoon

Session 1.3: IoT IVOPC UA I 4.0

Session 2.6 II: NB-IoT & LPWA II

Session 2.8 II: Wireless Power II

Session 4.4 II: Securing IoT II

Class 4.2: Hands-on Side Channel Power Analysis

Session 6.6: SW-Engineering VSW-Quality II

Session 6.8: SW-Engineering VIISW-Debugging

Session 10.4: SoC IVICs & IPs

Session 2.7: Communication VIWireless Localization

Page 5: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

5

OVERVIEW

Frank Riemenschneider, Publication Chair

Registered participants of the ewC2019 will receive the conference proceedings with the papers of selected contributions free of additional charge after the conference. The proceedings of ewC2018 reached nearly 1,000 pages with more than 170 papers.

1. Internet of Things – Platforms & Applications

2. Connected Systems 3. Embedded OS 4. Safety & Security 5. Hardware Engineering 6. Software & Systems Engineering7. Embedded

Vision8. Autonomous &

Intelligent Systems9. Embedded GUI & HMI

10. System-on-Chip

DAY 1: morning

Session 2.1: Communication I CAN

Session 2.2: Communication II Bluetooth

Session 3.1: OS Basics

Class 3.1: The Robert Berger Class: Embedded Linux – a Crash Course

Session 4.1 I: HW-based Security I

Session 4.2: Functional Safety

Session 5.1: RISC-V I Overview

Class 5.1: Ultra Low Power

Session 6.1: SW-Engineering ILanguages & Standards

Session 6.2 I: MISRA I

Class 6.1: The Bruce Douglass Class 1: Modeling

Session 7.1 I: Embedded Vision I

Session 8.1: Intelligent Systems IApplications

DAY 1: afternoon

Session 2.3: Communication IIIRealtime & TSN

Session 3.2: OSADL

Session 4.1 II: HW-based Security II

Session 5.2: RISC-V IISecurity

Session 6.2 II: MISRA II

Session 7.1 II: Embedded Vision II

Session 8.2: Intelligent Systems IIHardware

Session 9.1: Embedded GUI & HMI

Session 5.3: RISC-V IIISystem

DAY 2: morning

Session 1.1 I: IoT I

Session 2.4: Communication IVWireless Physical & Design Aspects

Session 3.3: Linux

Class 3.2: Embedded Android Workshop

Session 4.3 I: Security Architectures & Hacking I

Class 4.1: The ESCRYPT Class

Class 5.2: RISC-V Workshop I

Session 6.3: SW-Engineering IIDesign & Modeling

Class 6.2: The Bruce Douglass Class 2 Agile

Session 8.3: Intelligent Systems IIIAutonomous Driving

Session 10.1: SoC I Analog Circuits & Solutions

Session 10.2 I: SoC II EDA I

DAY 2: afternoon

Session 1.1 II: IoT II

Session 2.5: Communication VWireless Multiprotocol

Session 3.4: Virtualization

Class 3.3: Linux Hands-on Workshop with BeagleBoard.org PocketBeagle

Session 4.3 II: Security Architectures & Hacking II

Session 5.4: Power Supply

Session 6.4: SW-Engineering IIISW-Quality I

Session 8.4: Intelligent Systems IVDevelopment Methods

Session 10.2 II: SoC II EDA II

DAY 3: morning

Session 1.2: IoT III

Session 2.6 I: NB-IoT & LPWA I

Session 2.8 I: Wireless Power I

Session 3.5: OS-Security

Class 3.4: The Mc Guire Class:Introduction to Linux Kernel Tools

Session 4.4 I: Securing IoT I

Session 6.5: SW-Engineering IVDevelopment Process

Session 6.7: SW-Engineering VISW-Testing

Class 6.3: The Bruce Douglass Class 3 Safety & Security

Class 6.4: The Greg Davis ClassC / C++

Session 10.3: SoC IIIComplex Ics & System Solutions

DAY 3: afternoon

Session 1.3: IoT IVOPC UA I 4.0

Session 2.6 II: NB-IoT & LPWA II

Session 2.8 II: Wireless Power II

Session 4.4 II: Securing IoT II

Class 4.2: Hands-on Side Channel Power Analysis

Session 6.6: SW-Engineering VSW-Quality II

Session 6.8: SW-Engineering VIISW-Debugging

Session 10.4: SoC IVICs & IPs

Session 2.7: Communication VIWireless Localization

back row (from left to right):Dr. Bernd Hense,

Prof. Dr. Axel Sikora,Dr. Klaus Grimm

front row:Joachim Kroll,

Prof. Dr. Peter Fromm

STEERING BOARD

Page 6: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

6

Session 2.1: Communication I CAN

Session 3.1: OS Basics

Session 4.1 I: HW-based Security I

Session 4.2: Functional Safety

Session 5.1: RISC-V I Overview

Session 6.1: SW-Engineering I Languages & Standards

Session 7.1 I: Embedded Vision I

Session 8.1: Intelligent Systems I Applications

09:30-10:00 Troubleshooting in Embedded Networks Based on CANopen FDReiner Zitzmann, CAN in Automation

Introduction to OpenAMP: An Open Source Standard and API for Asymmetric Multiprocessing SystemsJeffrey Hancock, Mentor, A Siemens Business

Hardware Security for Embedded SystemsBen Boehman, Advanced Micro Devices (AMD)

High Performance Distributed Mixed Criticality Systems to SIL2Prof. Hans Dermot Doran, Zürich University of Applied Sciences

RISC-V; Practical Industry Approach to Getting Started with This TechnologyProf. Robert Oshana, NXP Semiconductors

Declarative Programming for Cortex-M Class Embedded DevicesAndy Walter, macio

Adding Intelligent Vision to Your Next Embedded ProductRadhika Jagtap, ARM

The Edge is Getting Smarter – AI in the IoT WorldAmir Sherman, Arrow

10:00-10:30 Automated Node ID Assignment in CAN and CAN(FD) NetworksChristian Keydel, Olaf Pfeiffer, Embedded Systems Academy

Techniques for Securing Low-Cost Embedded DevicesJosh Norem, Silicon Labs

Integrating Functional Safety Enabled 3rd Party IPAlexander Scheuermann, Texas Instruments

How to Benefit from RISC-V Based Linux for Embedded Industrial ApplicationsTim Morin, Microchip Technology

Navigating the Jungle of the Secure Coding StandardsMichal Rozenau, Parasoft

Implementation of Camera Based Driver Monitoring System Using Deep LearningNirmal Kumar Sancheti, AllGo Systems

Context-Aware Smart Home – Opening the Eyes of AI in the Home Through SensorsJohan Pedersen, Silicon Labs

Session 6.2 I: MISRA I

10:30-11:00 Signal Improvement Concept for CAN FD NetworksYao Yao, CAN in Automation

42 Reasons Using FreeRTOS Should Scare DevelopersJacob Beningo, Beningo Embedded Group

Transitioning from Software Based Security to Hardware Based Security – How to Make the LeapAnthony Ambrose, Data I/O

Modeling and Assessment of Safety Critical SystemsThomas Barth, Hochschule Darmstadt

The Soul of a New SoC: Hands-on Experience with Embedding a RISC-V CoreOnno Martens, Trinamic Motion Control

The MISRA C Coding Standard: A Key Enabler for the Development of Safety- and Security-Critical Embedded SoftwareRoberto Bagnara, BUGSENG & University of Parma

Develop Multi-platform Computer Vision Solution with Intel Up SquaredOluwatobi Oyinlola, Intel

Ultra Low Power Key Phrase Detection at the EdgeHussein Osman, Lattice Semiconductor

11:00-11:30 Coffee Break Coffee Break

11:30-12:00 Session 2.2: Communication II Bluetooth

How to Measure RTOS PerformanceColin Walls, Mentor, A Siemens Business

Making Products Safer and More Secure with an MPUJean Labrosse, Silicon Labs

Safety Critical RTOS: Adapting Across ApplicationsAndrew Longhurst, WITTENSTEIN high integrity systems

Methodology for Implementation of Custom Instructions in the RISC-V ArchitectureLarry Lapides, Imperas Software

MISRA C/C++ Situation ReportAndrew Banks, LDRA

High Image Quality for Embedded Vision ApplicationsHenning Haider, Allied Vision Technologies

Embedded Deep Learning Healthcare Collaboration SystemChungyeh Wang, IntelBluetooth Evolution

Jim Katsandres, Bluetooth SIG

12:00-12:30 Supercharging BLE Beacons with Bluetooth 5Joe Tillison, Silicon Labs

Home-grown or Commercial Linux: a Binary Choice?Iisko Lappalainen, MontaVista Software

Extend MCU Security Capabilities Beyond Trusted Execution with Hardware Crypto Acceleration and Asset ProtectionSaurin Choksi, NXP Semiconductors

Data and Control Coupling: Taint Analysis for Critical Embedded ApplicationsMark Pitchford, LDRA

Compliance Methodology and Initial Results for RISC-V ISA ImplementationsLee Moore, Imperas Software

Writing Reliable Code with MISRA CColin Walls, Mentor, A Siemens Business

Machine Learning for Embedded; a System of Software and Hardware ComponentsProf. Robert Oshana, NXP Semiconductors

Motor Condition Monitoring for Predictive Maintenance in „Industrie 4.0“Volker Rzehak, Texas Instruments

12:30-13:30 Lunch Break Lunch Break

13:30-14:30 Conference Keynote: Developing Game-Changing Embedded Intelligence

Jim Tung, MathWorks

Conference Keynote: Developing Game-Changing Embedded Intelligence

Jim Tung, MathWorks

Session 2.3: Communication III Real-Time & TSN

Session 3.2: OSADLpowered by

Session 4.1 II: HW-based Security II

Session 5.2: RISC-V II Security

Session 6.2 II: MISRA II

Session 7.1 II: Embedded Vision II

Session 8.2: Intelligent Systems II Hardware

Session 9.1: Embedded GUI & HMI

14:30-15:00 Real-time Control of Embedded Devices with OPC UA Pub/Sub w, w/o TSNHeinrich Munz, KUKA

Performance of Real-time Computing and Real-time Network Communication Using the Linux Mainline Kernel in the OSADL QA FarmDr. Carsten Emde, OSADL

What Can You Do When You Don’t Trust Your Processor?Yoni Kahana, Nanolock security

Maintaining Security In a Heterogeneous and Changing WorldJon Geater, Thales Cesare Garlati, prpl

Using MISRA C/C++ for Security and ReliabilityGreg Davis, Green Hills Software

Deep Learning Versus Rule-based-configurable Vision Software on Embedded DevicesChristoph Wagner, MVTec Software

How to Implement Deep Learning on FPGAsRobert Green, Asic Design Services

Which Graphic Software Library Should I Use for My Embedded Device?Aurindam Jana, The Qt Company

15:00-15:30 TSN – a Pragmatic ApproachMichael Roeder, SILICA - Avnet EMG

Safe and Secure Field Updates of Embedded Linux SystemsEnrico Jörns, Pengutronix

Methods for Provisioning Security Features in a Cortex-M33 based MCU Using a Physically Unclonable FunctionRob Cosaro, NXP Semiconductors

A New Zero-Trust Model For Securing Embedded SystemsChris Conlon, wolfSSL Cesare Garlati, prpl

Avoiding Unsafe and Insecure Complex SoftwareMark Richardson, LDRA

Sorting Through the Many Options for Machine Learning at the EdgeMarkus Levy, NXP Semiconductors

Machine Learning on Arm Cortex-M MicrocontrollersDr. Naveen Suda, ARM

15:30-16:00 Coffee Break Coffee Break

16:00-16:30 Time Sensitive Networking for Industry 4.0 and AutomotiveDr. Dadmehr Rezaei, Intel

Using Linux in Safety-critical Environments: Update on the SIL2LinuxMP ProjectProf. Nicholas Mc Guire, OpenTech EDV Research

Securing Edge Devices with Hardware-based SecurityTimo Grassmann, Infineon Technologies

Session 5.3: RISC-V III System Why Coding Standards and Implementing MISRA-CChris Hills, Phaedrus Systems

Enhance Human Vision with Intel Vision TechnologyPavani Kilari, Intel

Accelerating Next Generation Deep Learning Algorithms – How to Choose FPGA or GPU?Prof. Alok Gupta, Intel

Embedded Computer Vision Applications with QtBerthold Krevert, basysKom

User Mode Interrupts: A Must for Securing Embedded SystemsProf. Sandro Pinto, Uni do Minho Cesare Garlati, prpl

16:30-17:00 Extending Time Sensitive Networking over Next Generation Wi-FiRitu Sethi, Intel

Basics of Copyright Law and Open Source Licensing: Fulfilling License Obligations is Easier Than You May ThinkDr. Carsten Emde, OSADL

Leverage Security IP Embedded in MCU for New Connectivity Use CasesMayank Sharma, ARM

Embracing a System Level Approach: Combining Arm & RISC-V in Heterogeneous DesignsGajinder Panesar, UltraSoC

How Far Can You Trust Your Compiler?Mark Pitchford, LDRA

Implementing Monocular Visual SLAM for Augmented Reality in Low-Power Embedded Vision SystemsGordon Cooper, Synopsys

Hardware Implementation of Deep Neural Networks – A Comparison Between FPGA and GPUMarcus Rüb, Hahn-Schickard

3D GUIs for the Mass MarketJason Williamson, Altia

17:00-17:30 SPICE Simulation of 100Base-TX LAN-Transformer in an Ethernet Transmission PathSimon Mark, Würth Elektronik eiSos

OSS Compliance ToolsDr. Michael Jaeger, Software Compliance Academy

Secure Boot of a Complex Quad Core CPUKen Irving, Microchip Technology

RISC-V Project: from Embedded Cores to Vision of Datacenter ProcessorsDr. Zvonimir Bandic, Western Digital

Approaches for Improving Handling of Static Analysis FindingsDr. Claude Bolduc, Rogue Wave Software

Bridging Embedded Vision and Machine Vision with a Hybrid DriverMark Schenk, Allied Vision Technologies

Driving Deep Learning Performance Through Hardware Accelerators and Advanced Storage TechnologyMuhammad Waqas Sadiq Jutt, Intel

The Usage and Benefits of Global Palettes in Embedded Graphics ApplicationsKurt Parker, Microchip Technology

17:30-18:00 How to Implement Appropriate Processes for License Compliance?Dr. Catharina Maracke, Software Compliance Academy

powered by

CONFERENCE PROGRAM TUESDAY, FEBRUARY 26, 2019

KEYNOTE

13:30

www.embedded-world.eu

Page 7: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

7

Session 2.1: Communication I CAN

Session 3.1: OS Basics

Session 4.1 I: HW-based Security I

Session 4.2: Functional Safety

Session 5.1: RISC-V I Overview

Session 6.1: SW-Engineering I Languages & Standards

Session 7.1 I: Embedded Vision I

Session 8.1: Intelligent Systems I Applications

09:30-10:00 Troubleshooting in Embedded Networks Based on CANopen FDReiner Zitzmann, CAN in Automation

Introduction to OpenAMP: An Open Source Standard and API for Asymmetric Multiprocessing SystemsJeffrey Hancock, Mentor, A Siemens Business

Hardware Security for Embedded SystemsBen Boehman, Advanced Micro Devices (AMD)

High Performance Distributed Mixed Criticality Systems to SIL2Prof. Hans Dermot Doran, Zürich University of Applied Sciences

RISC-V; Practical Industry Approach to Getting Started with This TechnologyProf. Robert Oshana, NXP Semiconductors

Declarative Programming for Cortex-M Class Embedded DevicesAndy Walter, macio

Adding Intelligent Vision to Your Next Embedded ProductRadhika Jagtap, ARM

The Edge is Getting Smarter – AI in the IoT WorldAmir Sherman, Arrow

10:00-10:30 Automated Node ID Assignment in CAN and CAN(FD) NetworksChristian Keydel, Olaf Pfeiffer, Embedded Systems Academy

Techniques for Securing Low-Cost Embedded DevicesJosh Norem, Silicon Labs

Integrating Functional Safety Enabled 3rd Party IPAlexander Scheuermann, Texas Instruments

How to Benefit from RISC-V Based Linux for Embedded Industrial ApplicationsTim Morin, Microchip Technology

Navigating the Jungle of the Secure Coding StandardsMichal Rozenau, Parasoft

Implementation of Camera Based Driver Monitoring System Using Deep LearningNirmal Kumar Sancheti, AllGo Systems

Context-Aware Smart Home – Opening the Eyes of AI in the Home Through SensorsJohan Pedersen, Silicon Labs

Session 6.2 I: MISRA I

10:30-11:00 Signal Improvement Concept for CAN FD NetworksYao Yao, CAN in Automation

42 Reasons Using FreeRTOS Should Scare DevelopersJacob Beningo, Beningo Embedded Group

Transitioning from Software Based Security to Hardware Based Security – How to Make the LeapAnthony Ambrose, Data I/O

Modeling and Assessment of Safety Critical SystemsThomas Barth, Hochschule Darmstadt

The Soul of a New SoC: Hands-on Experience with Embedding a RISC-V CoreOnno Martens, Trinamic Motion Control

The MISRA C Coding Standard: A Key Enabler for the Development of Safety- and Security-Critical Embedded SoftwareRoberto Bagnara, BUGSENG & University of Parma

Develop Multi-platform Computer Vision Solution with Intel Up SquaredOluwatobi Oyinlola, Intel

Ultra Low Power Key Phrase Detection at the EdgeHussein Osman, Lattice Semiconductor

11:00-11:30 Coffee Break Coffee Break

11:30-12:00 Session 2.2: Communication II Bluetooth

How to Measure RTOS PerformanceColin Walls, Mentor, A Siemens Business

Making Products Safer and More Secure with an MPUJean Labrosse, Silicon Labs

Safety Critical RTOS: Adapting Across ApplicationsAndrew Longhurst, WITTENSTEIN high integrity systems

Methodology for Implementation of Custom Instructions in the RISC-V ArchitectureLarry Lapides, Imperas Software

MISRA C/C++ Situation ReportAndrew Banks, LDRA

High Image Quality for Embedded Vision ApplicationsHenning Haider, Allied Vision Technologies

Embedded Deep Learning Healthcare Collaboration SystemChungyeh Wang, IntelBluetooth Evolution

Jim Katsandres, Bluetooth SIG

12:00-12:30 Supercharging BLE Beacons with Bluetooth 5Joe Tillison, Silicon Labs

Home-grown or Commercial Linux: a Binary Choice?Iisko Lappalainen, MontaVista Software

Extend MCU Security Capabilities Beyond Trusted Execution with Hardware Crypto Acceleration and Asset ProtectionSaurin Choksi, NXP Semiconductors

Data and Control Coupling: Taint Analysis for Critical Embedded ApplicationsMark Pitchford, LDRA

Compliance Methodology and Initial Results for RISC-V ISA ImplementationsLee Moore, Imperas Software

Writing Reliable Code with MISRA CColin Walls, Mentor, A Siemens Business

Machine Learning for Embedded; a System of Software and Hardware ComponentsProf. Robert Oshana, NXP Semiconductors

Motor Condition Monitoring for Predictive Maintenance in „Industrie 4.0“Volker Rzehak, Texas Instruments

12:30-13:30 Lunch Break Lunch Break

13:30-14:30 Conference Keynote: Developing Game-Changing Embedded Intelligence

Jim Tung, MathWorks

Conference Keynote: Developing Game-Changing Embedded Intelligence

Jim Tung, MathWorks

Session 2.3: Communication III Real-Time & TSN

Session 3.2: OSADLpowered by

Session 4.1 II: HW-based Security II

Session 5.2: RISC-V II Security

Session 6.2 II: MISRA II

Session 7.1 II: Embedded Vision II

Session 8.2: Intelligent Systems II Hardware

Session 9.1: Embedded GUI & HMI

14:30-15:00 Real-time Control of Embedded Devices with OPC UA Pub/Sub w, w/o TSNHeinrich Munz, KUKA

Performance of Real-time Computing and Real-time Network Communication Using the Linux Mainline Kernel in the OSADL QA FarmDr. Carsten Emde, OSADL

What Can You Do When You Don’t Trust Your Processor?Yoni Kahana, Nanolock security

Maintaining Security In a Heterogeneous and Changing WorldJon Geater, Thales Cesare Garlati, prpl

Using MISRA C/C++ for Security and ReliabilityGreg Davis, Green Hills Software

Deep Learning Versus Rule-based-configurable Vision Software on Embedded DevicesChristoph Wagner, MVTec Software

How to Implement Deep Learning on FPGAsRobert Green, Asic Design Services

Which Graphic Software Library Should I Use for My Embedded Device?Aurindam Jana, The Qt Company

15:00-15:30 TSN – a Pragmatic ApproachMichael Roeder, SILICA - Avnet EMG

Safe and Secure Field Updates of Embedded Linux SystemsEnrico Jörns, Pengutronix

Methods for Provisioning Security Features in a Cortex-M33 based MCU Using a Physically Unclonable FunctionRob Cosaro, NXP Semiconductors

A New Zero-Trust Model For Securing Embedded SystemsChris Conlon, wolfSSL Cesare Garlati, prpl

Avoiding Unsafe and Insecure Complex SoftwareMark Richardson, LDRA

Sorting Through the Many Options for Machine Learning at the EdgeMarkus Levy, NXP Semiconductors

Machine Learning on Arm Cortex-M MicrocontrollersDr. Naveen Suda, ARM

15:30-16:00 Coffee Break Coffee Break

16:00-16:30 Time Sensitive Networking for Industry 4.0 and AutomotiveDr. Dadmehr Rezaei, Intel

Using Linux in Safety-critical Environments: Update on the SIL2LinuxMP ProjectProf. Nicholas Mc Guire, OpenTech EDV Research

Securing Edge Devices with Hardware-based SecurityTimo Grassmann, Infineon Technologies

Session 5.3: RISC-V III System Why Coding Standards and Implementing MISRA-CChris Hills, Phaedrus Systems

Enhance Human Vision with Intel Vision TechnologyPavani Kilari, Intel

Accelerating Next Generation Deep Learning Algorithms – How to Choose FPGA or GPU?Prof. Alok Gupta, Intel

Embedded Computer Vision Applications with QtBerthold Krevert, basysKom

User Mode Interrupts: A Must for Securing Embedded SystemsProf. Sandro Pinto, Uni do Minho Cesare Garlati, prpl

16:30-17:00 Extending Time Sensitive Networking over Next Generation Wi-FiRitu Sethi, Intel

Basics of Copyright Law and Open Source Licensing: Fulfilling License Obligations is Easier Than You May ThinkDr. Carsten Emde, OSADL

Leverage Security IP Embedded in MCU for New Connectivity Use CasesMayank Sharma, ARM

Embracing a System Level Approach: Combining Arm & RISC-V in Heterogeneous DesignsGajinder Panesar, UltraSoC

How Far Can You Trust Your Compiler?Mark Pitchford, LDRA

Implementing Monocular Visual SLAM for Augmented Reality in Low-Power Embedded Vision SystemsGordon Cooper, Synopsys

Hardware Implementation of Deep Neural Networks – A Comparison Between FPGA and GPUMarcus Rüb, Hahn-Schickard

3D GUIs for the Mass MarketJason Williamson, Altia

17:00-17:30 SPICE Simulation of 100Base-TX LAN-Transformer in an Ethernet Transmission PathSimon Mark, Würth Elektronik eiSos

OSS Compliance ToolsDr. Michael Jaeger, Software Compliance Academy

Secure Boot of a Complex Quad Core CPUKen Irving, Microchip Technology

RISC-V Project: from Embedded Cores to Vision of Datacenter ProcessorsDr. Zvonimir Bandic, Western Digital

Approaches for Improving Handling of Static Analysis FindingsDr. Claude Bolduc, Rogue Wave Software

Bridging Embedded Vision and Machine Vision with a Hybrid DriverMark Schenk, Allied Vision Technologies

Driving Deep Learning Performance Through Hardware Accelerators and Advanced Storage TechnologyMuhammad Waqas Sadiq Jutt, Intel

The Usage and Benefits of Global Palettes in Embedded Graphics ApplicationsKurt Parker, Microchip Technology

17:30-18:00 How to Implement Appropriate Processes for License Compliance?Dr. Catharina Maracke, Software Compliance Academy

powered by

TUESDAY, FEBRUARY 26, 2019

Want more? See page 12/13 for additional classes!

Page 8: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

8

CONFERENCE PROGRAM WEDNESDAY, FEBRUARY 27, 2019

Session 1.1 I: Internet of Things I

Session 2.4: Communication IV Wireless Physical & Design Aspects

Session 3.3: Linux

Session 4.3 I: Security Architectures & Hacking I

Session 6.3: Software Engineering II Design & Modeling

Session 8.3: Intelligent Systems III Autonomous Driving

Session 10.1: SoC I Analog Circuits & Solutions

09:30-10:00 Session Keynote: Digital Transformation: A Catalyst for Changing the Embedded Development ParadigmDr. Gareth Noyes, Wind River Systems

Model Based Approach for Wireless Network Design and ImplementationMarco Roggero, MathWorks

ARM SoCs in the Mainline Linux KernelArnd Bergmann, Linaro

Lessons to be Learnt from the World's Most Lethal Cyber-AttacksAnyck Turgeo, IBM

Migrating Legacy Software Applications to Model-Based and AUTOSAR: an Introduction to a Programmatic ApproachRoberto Agnelli, Teoresi

Law and Innovation – a Difficult Relationship?Susanne Meiners, NewTec

A Programmable Analog Computer on a ChipJohn Milios, Nicolas Clauvelin, Sendyne

10:00-10:30 Think Local: How to Migrate Intelligence from the Cloud to Embedded Devices at the EdgeChris Shore, ARM

Robust Software Defined COFDM-Modem for Embedded ApplicationsAndreas Bayer, A.R. Bayer DSP Systeme

Status of the Embedded GPU SpaceRobert Foss, Collabora

Quantum Computers Just Broke My Crypto – What Now?Kris Chaplin, Intel

Emerging MultiCore Development ParadigmsGreg Davis, Green Hills Software

Performance Profiling and Optimization for Autonomous Driving WorkloadYang Wang, Intel

Mission Impossible? If an Embedded Antenna Needs a Ground Plane of 100mm, How Can it Perform Brilliantly within an IoT Device with a Very Small PCB?Colin Newman, Antenova

10:30-11:00 The Future of IoT: Edge Intelligence, Distributed Processing and Data OrchestrationOlivier Pauzet, Sierra Wireless

From DC to Daylight: Single Chip RF Solutions for Wired, Wireless and High Frequency ApplicationsGlenn Steiner, Xilinx

XDP for Embedded NetworkingLuka Perkov, Sartura

Breaking Security: Power Analysis & Fault Injection AttacksDr. Colin O'Flynn, NewAE Technology/Dalhousie University

Coping with Complexity in Mobility by Connected Model-based Systems Engineering – An Insight Look Into Successful ProjectsAndreas Korff, Parametric Technology

A Machine Learning Environment for Evaluating Autonomous Driving SoftwareJussi Hanhirova, Aalto University

Protect the Ports!George Slama, Wurth Elektronik eiSos

11:00-11:30 Coffee Break Coffee Break

11:30-12:00 Where the Cloud Meets the EdgeBrad Cole, Digi International

How a Software-defined Radio Enables Diversity in IoT Endpoint DesignDan Clement, ON Semiconductor

Software Defined Peripherals in Linux Using Zephyr and RPMsgMarek Novak, NXP Semiconductors

Developing a Mixed-critical AUTOSAR Adaptive ECU with Safety and Security by DesignDr. Sergey Tverdyshev, SYSGO

Software Quality, Systemic Failure and Dual Modular RedundancyMark Pitchford, LDRA

Power Efficient AI Processors for Perception and Decision Making in Autonomous VehiclesLazaar Louis, Cadence

Session 10.2 I: SoC II EDA I

Using Models for SoC Hardware/Software Co-designBaruch Mitsengendler, MathWorks

12:00-12:30 Distributed Database Systems and Edge/Fog/Cloud ComputingSteve Graves, McObject

Introduction for Bluetooth5 IoT Device – RoKi Sensor NodeKoki Okada, ROHM Semiconductor

Linux Containers on a Small Device – a Good Idea?Valter Minute, Toradex

Enabling TPM2.0 with an Open Source Software Stack for Industrial and Automotive ApplicationsDr. Florian Schreiner, Infineon Technologies

Design Cycle Acceleration for Hardware/Software Co-Design with RenodeDr. Greg Sullivan, Dover Microsystems

Understanding the Safe Move to Intended Functionality in AutonomyJoe Dailey, Mentor, A Siemens Business

Matlab Simulink for FPGA-DesignDr. Baltasar Trancón Widemann, aicas

12:30-13:30 Lunch Break Lunch Break

13:30-14:30Conference Keynote:

Embedded Intelligence for the Next Wave of Smart Systems – Opportunities and Challenges on the Edge Jean-Marc Chery, STMicroelectronics

Conference Keynote: Embedded Intelligence for the Next Wave of Smart Systems – Opportunities and Challenges on the Edge

Jean-Marc Chery, STMicroelectronics

Session 1.1 II: Internet of Things II

Session 2.5: Communication V Wireless Multiprotocol

Session 3.4: Virtualization

Session 4.3 II: Security Architectures & Hacking II

Session 5.4: Power Supply

Session 6.4: Software Engineering III Software Quality I

Session 8.4: Intelligent Systems IV Development Methods

Session 10.2 II: SoC II EDA II

14:30-15:00 Databases at the Edge – ObjectBox for Devices and GatewaysMarkus Junginger, Objectbox

The Benefits and Challenges of a Common Software Platform for IoT DevelopmentDavid Egan, Silicon Labs

Virtualization Impact on the Performance in Embedded SystemsMarcus Nissemark, Green Hills Software

Secure Boot, Chain of Trust and Data ProtectionAkshay Bhat, Timesys

PoE: The Power Oriented EraJairo Bustos Heredia, Würth Elektronik eiSos

Semantic Static Analysis of IoT SoftwareDr. Pietro Ferrara, JuliaSoft

Efficient Workflow for Designing, Training and Deploying Deep Learning Models with MATLABMarco Roggero, The MathWorks

An Open Source Framework for Rapid Application Development for Complex SoCsAnton Krug, Microchip Technology

15:00-15:30 End-to-End Streaming Data Management Using Streaming Analytics Framework and Visual Data Management SystemDr. Wendy Siew Wen Chin, Intel

Radio Scheduling in Dynamic Multiprotocol ApplicationsMarius Munder, Silicon Labs

On the Road Towards Autonomous Driving – Simplifying AI with Virtualization TechnologiesDr. Ciwan Gouma, OpenSynergy

Chains of Trust: Building Security into Today’s Digital WorldGil Bernabeu, GlobalPlatform

Extending the Abilities of Battery-Powered End Nodes Through Better Power Supply DesignJosh Norem, Silicon Labs

Static Analysis of Finite State Machines with Zero False AlarmsDr. Daniel Kästner, AbsInt Angewandte Informatik

Accelerating Embedded InferencingRussell Klein, Mentor Graphics

Delivering Real Time and Determinism with Zynq Ultrascale+ MPSoC A53 Clusters Using Advanced Cache Management, Jailhouse and Xen HypervisorDr. Giulio Corradi, Xilinx

15:30-16:00 Coffee Break Coffee Break

16:00-16:30 Streaming Analytics Framework (SAF)Dr. Shao-Wen Yang, Intel

Low Power WiFi for IoT DevicesAsaf Even-Chen, Texas Instruments

The Automotive GPU gets VirtualKristof Beets, Imagination Technologies

Sidestepping Side Channel Attacks Through Separation & VirtualizationArun Subbarao, Lynx Software Technologies

OP-TEE – A Intro to a Trusted Execution EnvironmentAndreas Schuler, Missing Link Electronics

Machine Learning for Finding Programming Defects and AnomaliesDr. Paul Anderson, GrammaTech

Benchmarking the Intelligent Edge – A Framework to Measure Embedded AI PerformanceBruno Zimmermann, ZHAW InES

System-Level Modeling of Heterogeneous Compute Architectures for NVMExpress Protocol AccelerationCedrik Bock, Missing Link Electronics

16:30-17:00 Towards a Greener World with ECMA-393 Network Proxying: A Practical Guide To Support Multi-Protocols Network PresenceBoon Leong Ong, Intel

Manage Thousands of Nodes Through Secure Commissioning with Thread 1.2 Network ProtocolRobert David, NXP Semiconductors

Handling Mixed Criticality on Modern Multi-core Systems: the HERCULES ProjectDr. Paolo Gai, Evidence

Securing all Network Layers of CAN (FD) CommunicationOlaf Pfeiffer, Embedded Systems Academy Andreas Walz, HS Offenburg

Harvesting Energy from RS232 Data Signals to Power a Wired to Wireless ConverterProf. Dr. Marcel Meli, ZHAW InES

How to Find Concurrency Issues in C and C++Dr. Frank van den Beuken, Perforce Software

Designing Intelligent Systems Using Resource Constrained Edge DevicesJacob Beningo, Beningo Embedded Group

Shifting-Left Together – Enabling the Ecosystem with Virtual PlatformsDr. Jakob Engblom, Intel

17:00-17:30 Applying Cognitive Systems Engineering to Shape a Good Developer Experience of IoT SolutionsDr. Jongsoon Park, Intel

Taking Mesh Networking MainstreamWilliam Hart, Particle Industries

New Development Paradigms for Smart IoTLoïc Minier, Canonical

Simplifying Product Returns Through Device SecurityØivind Loe, Silicon Labs

Ferrite for EMC – What Do I Need to Know?George Slama, Wurth Elektronik eiSos

Automating Code Reviews by Writing Your Own Program Analysis RulesProf. Dr. Ralf Huuck, Synopsys

Safety in Cooperative Automated SystemsDr. Daniel Schneider, Fraunhofer IESE

Shift Left for Software Development Using Virtual Platform Emulation HybridsFrank Schirrmeister, Cadence Design Systems

www.embedded-world.eu

KEYNOTE

13:30

Page 9: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

9

WEDNESDAY, FEBRUARY 27, 2019

Session 1.1 I: Internet of Things I

Session 2.4: Communication IV Wireless Physical & Design Aspects

Session 3.3: Linux

Session 4.3 I: Security Architectures & Hacking I

Session 6.3: Software Engineering II Design & Modeling

Session 8.3: Intelligent Systems III Autonomous Driving

Session 10.1: SoC I Analog Circuits & Solutions

09:30-10:00 Session Keynote: Digital Transformation: A Catalyst for Changing the Embedded Development ParadigmDr. Gareth Noyes, Wind River Systems

Model Based Approach for Wireless Network Design and ImplementationMarco Roggero, MathWorks

ARM SoCs in the Mainline Linux KernelArnd Bergmann, Linaro

Lessons to be Learnt from the World's Most Lethal Cyber-AttacksAnyck Turgeo, IBM

Migrating Legacy Software Applications to Model-Based and AUTOSAR: an Introduction to a Programmatic ApproachRoberto Agnelli, Teoresi

Law and Innovation – a Difficult Relationship?Susanne Meiners, NewTec

A Programmable Analog Computer on a ChipJohn Milios, Nicolas Clauvelin, Sendyne

10:00-10:30 Think Local: How to Migrate Intelligence from the Cloud to Embedded Devices at the EdgeChris Shore, ARM

Robust Software Defined COFDM-Modem for Embedded ApplicationsAndreas Bayer, A.R. Bayer DSP Systeme

Status of the Embedded GPU SpaceRobert Foss, Collabora

Quantum Computers Just Broke My Crypto – What Now?Kris Chaplin, Intel

Emerging MultiCore Development ParadigmsGreg Davis, Green Hills Software

Performance Profiling and Optimization for Autonomous Driving WorkloadYang Wang, Intel

Mission Impossible? If an Embedded Antenna Needs a Ground Plane of 100mm, How Can it Perform Brilliantly within an IoT Device with a Very Small PCB?Colin Newman, Antenova

10:30-11:00 The Future of IoT: Edge Intelligence, Distributed Processing and Data OrchestrationOlivier Pauzet, Sierra Wireless

From DC to Daylight: Single Chip RF Solutions for Wired, Wireless and High Frequency ApplicationsGlenn Steiner, Xilinx

XDP for Embedded NetworkingLuka Perkov, Sartura

Breaking Security: Power Analysis & Fault Injection AttacksDr. Colin O'Flynn, NewAE Technology/Dalhousie University

Coping with Complexity in Mobility by Connected Model-based Systems Engineering – An Insight Look Into Successful ProjectsAndreas Korff, Parametric Technology

A Machine Learning Environment for Evaluating Autonomous Driving SoftwareJussi Hanhirova, Aalto University

Protect the Ports!George Slama, Wurth Elektronik eiSos

11:00-11:30 Coffee Break Coffee Break

11:30-12:00 Where the Cloud Meets the EdgeBrad Cole, Digi International

How a Software-defined Radio Enables Diversity in IoT Endpoint DesignDan Clement, ON Semiconductor

Software Defined Peripherals in Linux Using Zephyr and RPMsgMarek Novak, NXP Semiconductors

Developing a Mixed-critical AUTOSAR Adaptive ECU with Safety and Security by DesignDr. Sergey Tverdyshev, SYSGO

Software Quality, Systemic Failure and Dual Modular RedundancyMark Pitchford, LDRA

Power Efficient AI Processors for Perception and Decision Making in Autonomous VehiclesLazaar Louis, Cadence

Session 10.2 I: SoC II EDA I

Using Models for SoC Hardware/Software Co-designBaruch Mitsengendler, MathWorks

12:00-12:30 Distributed Database Systems and Edge/Fog/Cloud ComputingSteve Graves, McObject

Introduction for Bluetooth5 IoT Device – RoKi Sensor NodeKoki Okada, ROHM Semiconductor

Linux Containers on a Small Device – a Good Idea?Valter Minute, Toradex

Enabling TPM2.0 with an Open Source Software Stack for Industrial and Automotive ApplicationsDr. Florian Schreiner, Infineon Technologies

Design Cycle Acceleration for Hardware/Software Co-Design with RenodeDr. Greg Sullivan, Dover Microsystems

Understanding the Safe Move to Intended Functionality in AutonomyJoe Dailey, Mentor, A Siemens Business

Matlab Simulink for FPGA-DesignDr. Baltasar Trancón Widemann, aicas

12:30-13:30 Lunch Break Lunch Break

13:30-14:30Conference Keynote:

Embedded Intelligence for the Next Wave of Smart Systems – Opportunities and Challenges on the Edge Jean-Marc Chery, STMicroelectronics

Conference Keynote: Embedded Intelligence for the Next Wave of Smart Systems – Opportunities and Challenges on the Edge

Jean-Marc Chery, STMicroelectronics

Session 1.1 II: Internet of Things II

Session 2.5: Communication V Wireless Multiprotocol

Session 3.4: Virtualization

Session 4.3 II: Security Architectures & Hacking II

Session 5.4: Power Supply

Session 6.4: Software Engineering III Software Quality I

Session 8.4: Intelligent Systems IV Development Methods

Session 10.2 II: SoC II EDA II

14:30-15:00 Databases at the Edge – ObjectBox for Devices and GatewaysMarkus Junginger, Objectbox

The Benefits and Challenges of a Common Software Platform for IoT DevelopmentDavid Egan, Silicon Labs

Virtualization Impact on the Performance in Embedded SystemsMarcus Nissemark, Green Hills Software

Secure Boot, Chain of Trust and Data ProtectionAkshay Bhat, Timesys

PoE: The Power Oriented EraJairo Bustos Heredia, Würth Elektronik eiSos

Semantic Static Analysis of IoT SoftwareDr. Pietro Ferrara, JuliaSoft

Efficient Workflow for Designing, Training and Deploying Deep Learning Models with MATLABMarco Roggero, The MathWorks

An Open Source Framework for Rapid Application Development for Complex SoCsAnton Krug, Microchip Technology

15:00-15:30 End-to-End Streaming Data Management Using Streaming Analytics Framework and Visual Data Management SystemDr. Wendy Siew Wen Chin, Intel

Radio Scheduling in Dynamic Multiprotocol ApplicationsMarius Munder, Silicon Labs

On the Road Towards Autonomous Driving – Simplifying AI with Virtualization TechnologiesDr. Ciwan Gouma, OpenSynergy

Chains of Trust: Building Security into Today’s Digital WorldGil Bernabeu, GlobalPlatform

Extending the Abilities of Battery-Powered End Nodes Through Better Power Supply DesignJosh Norem, Silicon Labs

Static Analysis of Finite State Machines with Zero False AlarmsDr. Daniel Kästner, AbsInt Angewandte Informatik

Accelerating Embedded InferencingRussell Klein, Mentor Graphics

Delivering Real Time and Determinism with Zynq Ultrascale+ MPSoC A53 Clusters Using Advanced Cache Management, Jailhouse and Xen HypervisorDr. Giulio Corradi, Xilinx

15:30-16:00 Coffee Break Coffee Break

16:00-16:30 Streaming Analytics Framework (SAF)Dr. Shao-Wen Yang, Intel

Low Power WiFi for IoT DevicesAsaf Even-Chen, Texas Instruments

The Automotive GPU gets VirtualKristof Beets, Imagination Technologies

Sidestepping Side Channel Attacks Through Separation & VirtualizationArun Subbarao, Lynx Software Technologies

OP-TEE – A Intro to a Trusted Execution EnvironmentAndreas Schuler, Missing Link Electronics

Machine Learning for Finding Programming Defects and AnomaliesDr. Paul Anderson, GrammaTech

Benchmarking the Intelligent Edge – A Framework to Measure Embedded AI PerformanceBruno Zimmermann, ZHAW InES

System-Level Modeling of Heterogeneous Compute Architectures for NVMExpress Protocol AccelerationCedrik Bock, Missing Link Electronics

16:30-17:00 Towards a Greener World with ECMA-393 Network Proxying: A Practical Guide To Support Multi-Protocols Network PresenceBoon Leong Ong, Intel

Manage Thousands of Nodes Through Secure Commissioning with Thread 1.2 Network ProtocolRobert David, NXP Semiconductors

Handling Mixed Criticality on Modern Multi-core Systems: the HERCULES ProjectDr. Paolo Gai, Evidence

Securing all Network Layers of CAN (FD) CommunicationOlaf Pfeiffer, Embedded Systems Academy Andreas Walz, HS Offenburg

Harvesting Energy from RS232 Data Signals to Power a Wired to Wireless ConverterProf. Dr. Marcel Meli, ZHAW InES

How to Find Concurrency Issues in C and C++Dr. Frank van den Beuken, Perforce Software

Designing Intelligent Systems Using Resource Constrained Edge DevicesJacob Beningo, Beningo Embedded Group

Shifting-Left Together – Enabling the Ecosystem with Virtual PlatformsDr. Jakob Engblom, Intel

17:00-17:30 Applying Cognitive Systems Engineering to Shape a Good Developer Experience of IoT SolutionsDr. Jongsoon Park, Intel

Taking Mesh Networking MainstreamWilliam Hart, Particle Industries

New Development Paradigms for Smart IoTLoïc Minier, Canonical

Simplifying Product Returns Through Device SecurityØivind Loe, Silicon Labs

Ferrite for EMC – What Do I Need to Know?George Slama, Wurth Elektronik eiSos

Automating Code Reviews by Writing Your Own Program Analysis RulesProf. Dr. Ralf Huuck, Synopsys

Safety in Cooperative Automated SystemsDr. Daniel Schneider, Fraunhofer IESE

Shift Left for Software Development Using Virtual Platform Emulation HybridsFrank Schirrmeister, Cadence Design Systems

Want more? See page 12/13 for additional classes!

Page 10: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

10

CONFERENCE PROGRAM THURSDAY, FEBRUARY 28, 2019

Session 1.2: Internet of Things III

Session 2.6 I: NB-IoT & LPWA I

Session 2.8 I: Wireless Power I

Session 3.5: OS-Security

Session 4.4 I: Securing IoT I

Session 6.5: Software Engineering IV Development Process

Session 6.7: Software Engineering VI Software Testing

Session 10.3: SoC III Complex ICs & System Solutions

09:30-10:00 IoT Platforms: Selection and PitfallsJan Rodig, tresmo

What 5G Can Help for Industrial IOTYongbin Wei, Qualcomm Technologies

Market and Future of the Global Wireless Power Transfer IndustryJörg Hantschel, Würth Elektronik eiSos

The LTS Kernel is a Barrier to Building a Global Secure IoT PlatformGeorge Grey, Foundries.io

Common Pitfalls in IoT Security Implementations and How to Avoid ThemBrent Wilson, Silicon Labs

Agile in Development Regarding SafetyFrank Poignée, infoteam Software

Self-testing in Embedded SystemsColin Walls, Mentor, A Siemens Business

Next Generation 7nm FPGA Architecture Enables Machine Learning for Edge and Cloud ComputingManoj Roge, Achronix Semiconductor

10:00-10:30 Benchmarks: the Good, the Bad, and the UglyDiego Buitrago, Ben Boren, Intel

DECT-5G: Enhancing the DECT and ULE Standards to Embrace the Requirements of 5G (IMT-2020)Daniel Hartnett, DECT Forum

Qi Versus NFC: Evaluating NFC as a New Wireless Charging Solution for Small Battery Powered DevicesPeter Schmallegger, NXP Semiconductors Austria

How Should an RTOS Works in a TrustZone for Armv8-M Environment?Joseph Yiu, ARM

Security on IoT Devices with Secure ElementsTobias Schläpfer, ZHAW Institute of Embedded Systems

Adopting Agile/DevOps ALM in Automotive & Safety-critical DevelopmentPeter Haller, Intland Software

Testing Strategies for Asymmetric EnvironmentsJeffrey Fortin, Vector Informatik

Design Space Exploration for Convolutional Neural Networks on a 22nm FD-SOI SoCNicolai Behmann, Leibniz Universität Hannover

10:30-11:00 How the Use the IIC’s IICF to Select the Best IIoT Connectivity TechnologyBrett Murphy, Real Time Innovations

Evaluating NB-IoT Technology for Industrial CommunicationKofi Atta Nsiah, Hahn-Schickard

EMF: Requirements, Directives and Measure Method in EuropeWerner Grommes, DGUV/IFA

Designing a Secure and Reliable OTA Update Mechanism for IoT EndpointsNick Lethaby, Texas Instruments

Finding the Right Security Level for Your IoT ApplicationDr. Lars Lydersen, Silicon Labs

How to Balance Traceability and Compliance With Agile DevelopmentRobert Riccetti, Gerhard Kruger, Perforce Software

Testing Safety Critical Software Using Automated Fault InjectionMichael Wittner, Razorcat Development

High Performance Thermal Management Using Miniature Low Cost Microfluidics Heat SinkPhilippe Soussan, IMEC

11:00-11:30 Coffee Break Coffee Break

11:30-12:00 IoT Device Lifecycle Management – Update. Control. Secure. The Keys to IoT Device Best Performance and Secure Data-to-cloud ConnectionsFrancis D’Souza, Gemalto

LoRa LoRaWAN a Technologie Used in Industrial ApplicationMichael Fink, Semtech Germany

15W Inductive Wireless Power Transfer with Integrated Data CommunicationCem Som, Würth Elektronik eiSos

Android Security InternalsKarim Yaghmour, Opersys

Optimizing Threat Modelling to Create Robust IoT Security SolutionsSuresh Marisetty, ARM

Open Source Software and Mission-Critical Embedded Systems – Like Oil and WaterAndrew Banks, LDRA

Hardware in the Loop Test in Combination with Continuous IntegrationDr. Kristian Trenkel, iSyst Intelligente Systeme

400G+ Hyperscale Data Centers with 56G Ethernet PHY IPManmeet Walia, Synopsys

12:00-12:30 Improving Reliability of Industrial IoT SystemsEdwin de Jong, Real Time Innovations

The 20 Cent IoT is ComingAurelius Wosylus, Sigfox Germany

Boosting Contactless Charging to 40WFrancois Ricodeau, Semtech

A Future-proof Performance Enhancement for Secure MCUbootDerek Atkins, SecureRF

Secure Device Management for the Internet of ThingsGeert-Jan Schrijen, Intrinsic ID

Bug-killing Using Best-practice Development TechniquesMark Richardson, LDRA

Consistent Test Reuse Across MIL->SIL ->HIL in a Model-Driven Development WorkflowLance Brooks, Mentor, A Siemens Business

SSD SoC Microcontroller with Embedded Neural Network for 3D NAND Flash MemoriesDr. Lorenzo Zuolo, Microsemi

12:30-13:30 Lunch Break Lunch Break

Session 1.3: Internet of Things IV OPC UA I4.0

Session 2.6 II: NB-IoT & LPWA II

Session 2.8 II: Wireless Power II

Session 4.4 II: Securing IoT II

Session 6.6: Software Engineering V Software Quality II

Session 6.8: Software Engineering VII Software Debugging

Session 10.4: SoC IV ICs & IPs

13:30-14:00 Open Source OPC UA Pub/Sub Over TSN: Current Status and Implementation PlansJulius Pfrommer, Fraunhofer IOSB

Revolutionizing Worker Safety with Innovative IoT and LPWAN SolutionsAlbert Behr, Behr Technologies

Regulatory Requirements for Devices Using Wireless Power Transfer TechnologyNiels Jeß, CETECOM

Make Your IoT Project Secure in 5 StepsDr. Shawn Prestridge, IAR Systems

The (Software) Doctor is in...Software Vital Signs for Managing the Development of Your Embedded SoftwareProf. Robert Oshana, NXP Semiconductors

Tips and Tricks for DebuggingGreg Davis, Green Hills Software

RADAR Signal Processing on an Embedded System Using the Xilinx Zynq PlatformProf. Frank Kesel, Hochschule Pforzheim

14:00-14:30 OPC UA Application Development with Open62541Frank Meerkötter, basysKom

Unified Test Environment for LPWA and Cellular IoTJubin E. Sebastian, Offenburg University of Applied Sciences

Wireless Power Transfer Safety Test Toolkit: An Automated Tool for Compliance Testing of WPT Systems Including Implant SafetyDr. Ilaria Liorni, IT'IS Foundation

A Major New IoT Security Certification Scheme with Innovative Trust Signals – PSA CertifiedRobert Coombs, ARM

Miscompilation – A Thing of the PastDr. Daniel Kästner, AbsInt Angewandte Informatik

Lowering Software Development Costs by Using Arm Cortex-M Processors in an FPGAPhillip Burr, ARM

14:30-15:00 Dynamic LWM2M Data Model Mapping to OPC UADovydas Girdvainis, Hahn-Schickard

Wireless Power Transfer in Rotating AssembliesJelena Mijuskovic, Würth Elektronik eiSos

Secure and Scalable FW Upgrade Mechanisms in the IoT DomainFrank Audun Kvamtrø, Nordic Semiconductor

Uncovering Real-Time Bugs with Specialized RTOS ToolsJean Labrosse, Silicon Labs

Simplify Multi-core Debugging in Your SoC Development WorkflowDr. Shawn Prestridge, IAR Systems

Custom RF SoC Have Never Been this EasyEdel Griffith, Adesto Technologies

15:00-15:30 Coffee Break Coffee Break

15:30-16:00 Securing the IoTDorian Knoblauch, Fraunhofer FOKUS

Session 2.7: Communication VI Wireless Localization

Wireless Power Transmission: High Efficient Solution Based on Resonance Effects with High Power Density for Long Transmission DistancesGünther Trautzl, WPT Systems

Security and Licensing for IoT DevicesGuenther Fischer, Wibu-Systems

Safety, Security, and Compiler BugsGreg Davis, Green Hills Software

Connectivity, Complexity & the Role of Enhanced DebuggingTrish Messiter, Clarinox Technologies

Virtual Digital Sensor for Analog Signal Processing on SoCsVinay Bansal, Faststream TechnologiesIntroduction to UWB Network

Topologies and ApplicationsKenneth Dwyer, Decawave

16:00-16:30 Assistance Systems for Industrial 4.0 EnvironmentsBjoern Barig, IMMS

Distance Estimation Using Narrow-band Wireless Time of FlightCarlos Neri, NXP Semiconductors

Cost Optimization in Wireless Power SystemsChristian Wern, etatronix

Why Should an IoT Sensor Maker Care About the Blockchain?Mark Hebbel, Basler

The AMASS Approach for Assurance and Certification of Critical SystemsGaël Blondelle, Eclipse Foundation Europe

High Speed Communication: Everything SerialDirk van den Heuvel, Topic Embedded Products

www.embedded-world.eu

Page 11: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

11

THURSDAY, FEBRUARY 28, 2019

Session 1.2: Internet of Things III

Session 2.6 I: NB-IoT & LPWA I

Session 2.8 I: Wireless Power I

Session 3.5: OS-Security

Session 4.4 I: Securing IoT I

Session 6.5: Software Engineering IV Development Process

Session 6.7: Software Engineering VI Software Testing

Session 10.3: SoC III Complex ICs & System Solutions

09:30-10:00 IoT Platforms: Selection and PitfallsJan Rodig, tresmo

What 5G Can Help for Industrial IOTYongbin Wei, Qualcomm Technologies

Market and Future of the Global Wireless Power Transfer IndustryJörg Hantschel, Würth Elektronik eiSos

The LTS Kernel is a Barrier to Building a Global Secure IoT PlatformGeorge Grey, Foundries.io

Common Pitfalls in IoT Security Implementations and How to Avoid ThemBrent Wilson, Silicon Labs

Agile in Development Regarding SafetyFrank Poignée, infoteam Software

Self-testing in Embedded SystemsColin Walls, Mentor, A Siemens Business

Next Generation 7nm FPGA Architecture Enables Machine Learning for Edge and Cloud ComputingManoj Roge, Achronix Semiconductor

10:00-10:30 Benchmarks: the Good, the Bad, and the UglyDiego Buitrago, Ben Boren, Intel

DECT-5G: Enhancing the DECT and ULE Standards to Embrace the Requirements of 5G (IMT-2020)Daniel Hartnett, DECT Forum

Qi Versus NFC: Evaluating NFC as a New Wireless Charging Solution for Small Battery Powered DevicesPeter Schmallegger, NXP Semiconductors Austria

How Should an RTOS Works in a TrustZone for Armv8-M Environment?Joseph Yiu, ARM

Security on IoT Devices with Secure ElementsTobias Schläpfer, ZHAW Institute of Embedded Systems

Adopting Agile/DevOps ALM in Automotive & Safety-critical DevelopmentPeter Haller, Intland Software

Testing Strategies for Asymmetric EnvironmentsJeffrey Fortin, Vector Informatik

Design Space Exploration for Convolutional Neural Networks on a 22nm FD-SOI SoCNicolai Behmann, Leibniz Universität Hannover

10:30-11:00 How the Use the IIC’s IICF to Select the Best IIoT Connectivity TechnologyBrett Murphy, Real Time Innovations

Evaluating NB-IoT Technology for Industrial CommunicationKofi Atta Nsiah, Hahn-Schickard

EMF: Requirements, Directives and Measure Method in EuropeWerner Grommes, DGUV/IFA

Designing a Secure and Reliable OTA Update Mechanism for IoT EndpointsNick Lethaby, Texas Instruments

Finding the Right Security Level for Your IoT ApplicationDr. Lars Lydersen, Silicon Labs

How to Balance Traceability and Compliance With Agile DevelopmentRobert Riccetti, Gerhard Kruger, Perforce Software

Testing Safety Critical Software Using Automated Fault InjectionMichael Wittner, Razorcat Development

High Performance Thermal Management Using Miniature Low Cost Microfluidics Heat SinkPhilippe Soussan, IMEC

11:00-11:30 Coffee Break Coffee Break

11:30-12:00 IoT Device Lifecycle Management – Update. Control. Secure. The Keys to IoT Device Best Performance and Secure Data-to-cloud ConnectionsFrancis D’Souza, Gemalto

LoRa LoRaWAN a Technologie Used in Industrial ApplicationMichael Fink, Semtech Germany

15W Inductive Wireless Power Transfer with Integrated Data CommunicationCem Som, Würth Elektronik eiSos

Android Security InternalsKarim Yaghmour, Opersys

Optimizing Threat Modelling to Create Robust IoT Security SolutionsSuresh Marisetty, ARM

Open Source Software and Mission-Critical Embedded Systems – Like Oil and WaterAndrew Banks, LDRA

Hardware in the Loop Test in Combination with Continuous IntegrationDr. Kristian Trenkel, iSyst Intelligente Systeme

400G+ Hyperscale Data Centers with 56G Ethernet PHY IPManmeet Walia, Synopsys

12:00-12:30 Improving Reliability of Industrial IoT SystemsEdwin de Jong, Real Time Innovations

The 20 Cent IoT is ComingAurelius Wosylus, Sigfox Germany

Boosting Contactless Charging to 40WFrancois Ricodeau, Semtech

A Future-proof Performance Enhancement for Secure MCUbootDerek Atkins, SecureRF

Secure Device Management for the Internet of ThingsGeert-Jan Schrijen, Intrinsic ID

Bug-killing Using Best-practice Development TechniquesMark Richardson, LDRA

Consistent Test Reuse Across MIL->SIL ->HIL in a Model-Driven Development WorkflowLance Brooks, Mentor, A Siemens Business

SSD SoC Microcontroller with Embedded Neural Network for 3D NAND Flash MemoriesDr. Lorenzo Zuolo, Microsemi

12:30-13:30 Lunch Break Lunch Break

Session 1.3: Internet of Things IV OPC UA I4.0

Session 2.6 II: NB-IoT & LPWA II

Session 2.8 II: Wireless Power II

Session 4.4 II: Securing IoT II

Session 6.6: Software Engineering V Software Quality II

Session 6.8: Software Engineering VII Software Debugging

Session 10.4: SoC IV ICs & IPs

13:30-14:00 Open Source OPC UA Pub/Sub Over TSN: Current Status and Implementation PlansJulius Pfrommer, Fraunhofer IOSB

Revolutionizing Worker Safety with Innovative IoT and LPWAN SolutionsAlbert Behr, Behr Technologies

Regulatory Requirements for Devices Using Wireless Power Transfer TechnologyNiels Jeß, CETECOM

Make Your IoT Project Secure in 5 StepsDr. Shawn Prestridge, IAR Systems

The (Software) Doctor is in...Software Vital Signs for Managing the Development of Your Embedded SoftwareProf. Robert Oshana, NXP Semiconductors

Tips and Tricks for DebuggingGreg Davis, Green Hills Software

RADAR Signal Processing on an Embedded System Using the Xilinx Zynq PlatformProf. Frank Kesel, Hochschule Pforzheim

14:00-14:30 OPC UA Application Development with Open62541Frank Meerkötter, basysKom

Unified Test Environment for LPWA and Cellular IoTJubin E. Sebastian, Offenburg University of Applied Sciences

Wireless Power Transfer Safety Test Toolkit: An Automated Tool for Compliance Testing of WPT Systems Including Implant SafetyDr. Ilaria Liorni, IT'IS Foundation

A Major New IoT Security Certification Scheme with Innovative Trust Signals – PSA CertifiedRobert Coombs, ARM

Miscompilation – A Thing of the PastDr. Daniel Kästner, AbsInt Angewandte Informatik

Lowering Software Development Costs by Using Arm Cortex-M Processors in an FPGAPhillip Burr, ARM

14:30-15:00 Dynamic LWM2M Data Model Mapping to OPC UADovydas Girdvainis, Hahn-Schickard

Wireless Power Transfer in Rotating AssembliesJelena Mijuskovic, Würth Elektronik eiSos

Secure and Scalable FW Upgrade Mechanisms in the IoT DomainFrank Audun Kvamtrø, Nordic Semiconductor

Uncovering Real-Time Bugs with Specialized RTOS ToolsJean Labrosse, Silicon Labs

Simplify Multi-core Debugging in Your SoC Development WorkflowDr. Shawn Prestridge, IAR Systems

Custom RF SoC Have Never Been this EasyEdel Griffith, Adesto Technologies

15:00-15:30 Coffee Break Coffee Break

15:30-16:00 Securing the IoTDorian Knoblauch, Fraunhofer FOKUS

Session 2.7: Communication VI Wireless Localization

Wireless Power Transmission: High Efficient Solution Based on Resonance Effects with High Power Density for Long Transmission DistancesGünther Trautzl, WPT Systems

Security and Licensing for IoT DevicesGuenther Fischer, Wibu-Systems

Safety, Security, and Compiler BugsGreg Davis, Green Hills Software

Connectivity, Complexity & the Role of Enhanced DebuggingTrish Messiter, Clarinox Technologies

Virtual Digital Sensor for Analog Signal Processing on SoCsVinay Bansal, Faststream TechnologiesIntroduction to UWB Network

Topologies and ApplicationsKenneth Dwyer, Decawave

16:00-16:30 Assistance Systems for Industrial 4.0 EnvironmentsBjoern Barig, IMMS

Distance Estimation Using Narrow-band Wireless Time of FlightCarlos Neri, NXP Semiconductors

Cost Optimization in Wireless Power SystemsChristian Wern, etatronix

Why Should an IoT Sensor Maker Care About the Blockchain?Mark Hebbel, Basler

The AMASS Approach for Assurance and Certification of Critical SystemsGaël Blondelle, Eclipse Foundation Europe

High Speed Communication: Everything SerialDirk van den Heuvel, Topic Embedded Products

Want more? See page 12/13 for additional classes!

Prog

ram

is s

ubje

ct to

cha

nge

(as

at 0

5.12

.201

8)

Page 12: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

12

WEDNESDAY, FEBRUARY 27, 2019

Class 3.2: Embedded Android Workshop

Class 3.3: Linux Hands-on Workshop with BeagleBoard.org PocketBeagle

Class 4.1: The ESCRYPT Class

Class 5.2: RISC-V Workshop

Class 6.2: The Bruce Douglass Class 2 Agile

09:30-10:30 Embedded Android WorkshopKarim Yaghmour, Opersys

The ESCRYPT Class – Security for a Globally Connected Vehicle ESCRYPT, et.al.

How to Build a RISC-V Embedded System In Just 30 Minutes Cesare Garlati, prpl Foundation

Agile Systems Engineering

10:30-11:00 How to Secure a RISC-V Embedded System In Just 30 MinutesDon Barnetson, Zorlu Ventures Cesare Garlati, prpl Foundation11:00-11:30

11:30-12:00 Agile for Safety Critical Systems: Design Practices

12:00-12:30 Trusted Execution Environments: A System Design Perspective Boran Car, Hex Five Security Cesare Garlati, prpl Foundation

14:30-15:30 Getting Started with PocketBeagle from BeagleBoard.org – A Hands-On Coding with Embedded Linux WorkshopJason Kridner, Texas Instruments & BeagleBoard.org Foundation

Agile for Safety Critical Systems: Quality Assurance Practices

15:30-16:00

16:00-17:30 Agile for Safety Critical Systems: Evidence-Oriented PracticesDr. Bruce Douglass, IBM

CONFERENCE PROGRAM

TUESDAY, FEBRUARY 26, 2019

Class 3.1: The Robert Berger Class – Embedded Linux

Class 5.1: Ultra Low Power Class

Class 6.1: The Bruce Douglass Class 1 – Modeling

09:30-10:30 Embedded Linux a Crash CourseRobert Berger, Reliable Embedded Systems

Ultra Low Power Hands-on WorkshopHerman Roebbers, Altran

Model-Based Interface Control Documents

10:30-11:00 Improving System Requirements with Use Case Models

11:30-12:30 Everything you Always Wanted to Know About Flowcharts and Activity Diagrams

14:30-15:30 Advanced Behavioral Modeling with State Machines

16:00-17:00 Data Modeling for Systems Engineering and System Specification

17:00-17:30 The Tao of SysML Dr. Bruce Douglass, IBM

THURSDAY, FEBRUARY 28, 2019

Class 3.4: The Mc Guire Class: Introduction to Linux Kernel Tools

Class 4.2: Hands on Side Channel Power Analysis

Class 6.3: The Bruce Douglass Class 3 Safety & Security

Class 6.4: The Greg Davis Class C / C++

09:30-10:15 OSADL: Introduction to Linux Kernel ToolsProf. Nicholas Mc Guire, Markus Kreidl, OSADL

powered by

Safety Analysis for Embedded Systems Development

Writing Reliable and Portable C/C++ Code

10:15-10:30 Understand Shared Memory in the C/C++ Standards

10:30-11:00 Safety Design for Embedded Systems Development

11:00-11:15

11:30-12:00 Model-Based Systems Engineering for CybersecurityDr. Bruce Douglass, IBM

Porting C Code to C++ Code

12:00-12:30 Hack-Proofing Your C/C++ CodeGreg Davis, Green Hills Software

13:30-16:30 Hands on Side Channel Power Analysis Dr. Colin O‘Flynn, NewAE Technology/Dalhousie University

www.embedded-world.eu

Page 13: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

13

WEDNESDAY, FEBRUARY 27, 2019

Class 3.2: Embedded Android Workshop

Class 3.3: Linux Hands-on Workshop with BeagleBoard.org PocketBeagle

Class 4.1: The ESCRYPT Class

Class 5.2: RISC-V Workshop

Class 6.2: The Bruce Douglass Class 2 Agile

09:30-10:30 Embedded Android WorkshopKarim Yaghmour, Opersys

The ESCRYPT Class – Security for a Globally Connected Vehicle ESCRYPT, et.al.

How to Build a RISC-V Embedded System In Just 30 Minutes Cesare Garlati, prpl Foundation

Agile Systems Engineering

10:30-11:00 How to Secure a RISC-V Embedded System In Just 30 MinutesDon Barnetson, Zorlu Ventures Cesare Garlati, prpl Foundation11:00-11:30

11:30-12:00 Agile for Safety Critical Systems: Design Practices

12:00-12:30 Trusted Execution Environments: A System Design Perspective Boran Car, Hex Five Security Cesare Garlati, prpl Foundation

14:30-15:30 Getting Started with PocketBeagle from BeagleBoard.org – A Hands-On Coding with Embedded Linux WorkshopJason Kridner, Texas Instruments & BeagleBoard.org Foundation

Agile for Safety Critical Systems: Quality Assurance Practices

15:30-16:00

16:00-17:30 Agile for Safety Critical Systems: Evidence-Oriented PracticesDr. Bruce Douglass, IBM

CLASSES

TUESDAY, FEBRUARY 26, 2019

Class 3.1: The Robert Berger Class – Embedded Linux

Class 5.1: Ultra Low Power Class

Class 6.1: The Bruce Douglass Class 1 – Modeling

09:30-10:30 Embedded Linux a Crash CourseRobert Berger, Reliable Embedded Systems

Ultra Low Power Hands-on WorkshopHerman Roebbers, Altran

Model-Based Interface Control Documents

10:30-11:00 Improving System Requirements with Use Case Models

11:30-12:30 Everything you Always Wanted to Know About Flowcharts and Activity Diagrams

14:30-15:30 Advanced Behavioral Modeling with State Machines

16:00-17:00 Data Modeling for Systems Engineering and System Specification

17:00-17:30 The Tao of SysML Dr. Bruce Douglass, IBM

THURSDAY, FEBRUARY 28, 2019

Class 3.4: The Mc Guire Class: Introduction to Linux Kernel Tools

Class 4.2: Hands on Side Channel Power Analysis

Class 6.3: The Bruce Douglass Class 3 Safety & Security

Class 6.4: The Greg Davis Class C / C++

09:30-10:15 OSADL: Introduction to Linux Kernel ToolsProf. Nicholas Mc Guire, Markus Kreidl, OSADL

powered by

Safety Analysis for Embedded Systems Development

Writing Reliable and Portable C/C++ Code

10:15-10:30 Understand Shared Memory in the C/C++ Standards

10:30-11:00 Safety Design for Embedded Systems Development

11:00-11:15

11:30-12:00 Model-Based Systems Engineering for CybersecurityDr. Bruce Douglass, IBM

Porting C Code to C++ Code

12:00-12:30 Hack-Proofing Your C/C++ CodeGreg Davis, Green Hills Software

13:30-16:30 Hands on Side Channel Power Analysis Dr. Colin O‘Flynn, NewAE Technology/Dalhousie University

embedded world Conference 2019 – Embedded Intelligence

Classes:

In the embedded world Classes, reputed experts speak on special topics for half a day or a full day. This format is aimed primarily at participants who want to familiarize themselves thoroughly and efficiently with a specific topic. Straightforward and concise dialogues with the experts help to answer many questions and are an excellent opportunity of quickly expanding your current expertise. The classes aim at maximum learning goals.

With these equally compact and concentrated classes, the embedded world Conference covers a broad range of substantial aspects of embedded systems in detail to offer developers competent technical groundwork.

Be sure to register now!

Page 14: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

14

CLASSES embedded world Conference 2019

Tuesday, Feb 26, 2019

Wednesday, Feb 27, 2019

Thursday, Feb 28, 2019

am pm am pm am pmClass 3.1: The Robert Berger Class: Embedded Linux – a Crash Course nClass 3.2: Embedded Android Workshop nClass 3.3: Linux Hands-on Workshop with BeagleBoard.org PocketBeagle nClass 3.4: The Mc Guire Class: Introduction to Linux Kernel Tools nClass 4.1: The ESCRYPT Class nClass 4.2: Hands on Side Channel Power Analysis nClass 5.1: Ultra Low Power Class nClass 5.2: RISC-V Workshop nClass 6.1: The Bruce Douglass Class 1 Modeling nClass 6.2: The Bruce Douglass Class 2 Agile nClass 6.3: The Bruce Douglass Class 3 Safety & Security nClass 6.4: The Greg Davis Class C / C++ n

Venue: NürnbergMesse Messezentrum NCC Ost 90471 Nuremberg, Germany

Details and Registration: www.embedded-world.eu

Register online: www.embedded-world.eu or send this fax registration form to + 49 (0) 89 / 255 56 – 0155

Please make sure that you are sending both pages!

Class Fees Early Rate until January 17, 2019 Late Rate from January 18, 2019

Half Day Class EUR 380,– EUR 440,–

Full Day Class EUR 570,– EUR 650,–

Conference Fees Early Rate until January 17, 2019 Late Rate from January 18, 2019

1 Conference Block EUR 325,– EUR 370,–2 Conference Blocks EUR 445,– EUR 500,–3 Conference Blocks EUR 560,– EUR 640,–4 Conference Blocks EUR 660,– EUR 750,–5 Conference Blocks EUR 745,– EUR 845,–Full Conference (Classes excluded) EUR 790,– EUR 910,–

Please tick:

All fees plus 19% VAT

I am Exhibitor Student Co-Speaker (with )

Company

Mr./Ms./Title*First Name*Last Name*

Street/No.*Department

ZIP-Code*City*Country*

Phone*E-Mail*

Date/Signature*

* Please note: In order to be registered you have to fill in all required fields marked with an asterisk (*). (A confirmation email will be sent to you.) If yot want to state a different billing-address: Please register online.

Exhibition-

Ticket

included!

Page 15: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

15

SESSIONS embedded world Conference 2019

Tuesday, Feb 26, 2019

Wednesday, Feb 27, 2019

Thursday, Feb 28, 2019

Block 1am

Block 2pm

Block 3am

Block 4pm

Block 5am

Block 6pm

Session 1.1 I/II: Internet of Things I/II n nSession 1.2: Internet of Things III nSession 1.3: Internet of Things IV OPC UA I4.0 n nSession 2.1: Communication I CAN nSession 2.2: Communication II Bluetooth nSession 2.3: Communication III Real-Time & TSN nSession 2.4: Communication IV Wireless Physical & Design Aspects nSession 2.5: Communication V Wireless Multiprotocol nSession 2.6 I/II: NB-IoT & LPWA I/II n nSession 2.7: Communication VI Wireless Localization nSession 2.8 I/II: Wireless Power I/II n nSession 3.1: OS Basics nSession 3.2: OSADL nSession 3.3: Linux nSession 3.4: Virtualization nSession 3.5: OS-Security nSession 4.1 I/II: HW-based Security I/II n nSession 4.2: Functional Safety nSession 4.3 I/II: Security Architectures & Hacking I/II n nSession 4.4 I/II: Securing IoT I/II n nSession 5.1: RISC-V I Overview nSession 5.2: RISC-V II Security nSession 5.3: RISC-V III System nSession 5.4: Power Supply nSession 6.1: SW-Engineering I Languages & Standards nSession 6.2 I/II: MISRA I/II n nSession 6.3: Software Engineering II Design & Modeling nSession 6.4: Software Engineering III Software Quality I nSession 6.5: Software Engineering IV Development Process nSession 6.6: Software Engineering V Software Quality II nSession 6.7: Software Engineering VI Software Testing nSession 6.8: Software Engineering VII Software Debugging nSession 7.1 I/II: Embedded Vision I/II n nSession 8.1: Intelligent Systems I Applications nSession 8.2: Intelligent Systems II Hardware nSession 8.3: Intelligent Systems III Autonomous Driving nSession 8.4: Intelligent Systems IV Development Methods nSession 9.1: Embedded GUI & HMI nSession 10.1: SoC I Analog Circuits & Solutions nSession 10.2 I/II: SoC II EDA I/II n nSession 10.3: SoC III Complex ICs & System Solutions nSession 10.4: SoC IV ICs & IPs n

Please tick:

Terms and Conditions:

1. The attendance fee includes participation on the booked conference days, proceedings, refreshments and free admission to the embedded world 2019 Exhibition. If morning and afternoon blocks/classes are booked, lunch is also included for that day.

2. You will receive a confirmation of your conference registration along with your invoice.

3. Cancellations received in writing before or on February 05, 2019 will be subject to a service charge of EUR 50 for one-day registrations and EUR 100 for several-days registrations. For all cancellations received after February 05, 2019 the full conference fee remains payable. Substitutions within the same company are welcome at any time.

4. The organizers reserve the right to make changes in the program and/or speakers or to cancel sessions/classes if conditions beyond its control prevail. Please check www.embedded-world.eu for the latest conference information.

5. Students are granted a 50 % reduction, student ID required. Please submit by fax to + 49 (0) 89 / 255 56 - 0155 or by email to [email protected].

6. Exhibitors or Co-Speakers will receive a discount of 50 % limited to one person.

7. For registrations of five persons and more from one company, please contact our conference department for special rates.

8. On-site-registration: Please register in advance. For on-site-registration a surcharge of EUR 70 per attendee will apply.

Contact: Ms. Juliane Heger Phone: +49 (0) 89 / 255 56 - 1155 Email: [email protected] FACHMEDIEN GmbH Richard-Reitzner-Allee 2 85540 Haar, Germany

Page 16: Nuremberg, Germany 26.–28.2 - Yocto Project · Systems Engineering, 7. Embedded Vision, 8. Autonomous & Intelligent Systems, 9. Embedded GUI & HMI, and 10. System-on-Chip. The solution-oriented

#INDUCTORDUET

An ExcellentDuet!

Up to 0.995 coupling coefficient

Up to 2.0 kV isolation

Soft saturation

Up to 120 A ISAT

and 48 A IR

Large portfolio

Coupled InductorsThe WE-MCRI is an innovative molded coupled inductor with fully automated bifi lar winding process.It offers an almost ideal coupling coeffi cient up to 0.995. The WE-MCRI features a soft saturationbehavior with its crystalline core structure and distributed air gap. The coupled inductor range includeshigh voltage isolation versions up to 2 kV, low profi le types and versions with various turns ratios.

For further information, please visit: www.we-online.com/coupled

WE-MCRI

High Coupling

High Voltage

Various Turns Ratios

Low Profi le

High Current

High Saturation Current

WE-CPIB HV WE-EHPI WE-TDC WE-CFWI WE-DCT

© e

iSos